Archives - Phishing Attack

Don’t overshare on social media

Love sharing selfies and life updates on social media? Too much info can be a security risk. Think of it like leaving your house keys on the porch – anyone could grab them. Why the caution? Malicious folks can use those juicy details you post to: So, how to stay safe without being a social […]

Implement email filtering and anti-phishing solutions

With upwards of 90% of cyberattacks beginning with a phishing email, it’s important that an organization adopts email filtering and anti-phishing solutions. Such solutions work to mitigate the risk of phishing attacks through email — minimizing the financial, reputational and operation risks associated with successful phishing attacks.

Stay informed about phishing tactics

While phishing attacks remain a prevalent threat, staying informed on the latest attack evolutions can help to safeguard your devices. As general rules: Beyond these practices, consider taking some time to read more extensively on phishing attacks and put into practice safety measures accordingly.

Conduct regular phishing awareness training

Phishing is one of the most common cyber threats, with the number of phishing-related daily emails reaching millions. Speaking to business owners and managers, consider implementing routine phishing awareness training for employees, focusing on simulated phishing exercises to let employees know how to recognize and report phishing attempts. Given that employees are common targets for […]

Chrome’s phishing extensions help guard against scams

Phishing is a type of online scam designed to get you to reveal personal information such as credit card numbers and passwords. Chrome’s PhishDetector detects phishing attacks on online banking websites. Similarly, PhishTector identifies phishing emails in Gmail.

Phishing scams can come from anywhere

While email is perhaps the most common source of phishing attacks, they can come from practically anywhere. Text messages, social media, traditional mail and even phone calls may all follow the common phisher’s playbook by pretending to be a legitimate source asking for information. Remember: If you’re not sure, contact the alleged source directly with […]